-

Jump to content



Photo

Google takes swipe at Malware publishers in Marketplace


This topic has been archived. This means that you cannot reply to this topic.
No replies to this topic

#1 of 1 mattCR

mattCR

    Lead Actor

  • 9,998 posts
  • Join Date: Oct 05 2005
  • Real Name:Matt
  • LocationOverland Park, KS

Posted June 01 2011 - 10:54 AM

http://www.engadget....-26-deleteriou/ Google removed 26 apps (so far) after discovering they were filled with snoop ware, sending back to the author all the information of your phone, including IMEI and IMSI info. The hack would also effectively allow for remote duplication of content data if that first step is true. Google's step follows several which have been made to remove Android related virus problems, a growing problem of late. http://latimesblogs....r-secutiry.html http://www.zdnet.com...aven-in-q1/8707

As for emerging threats, McAfee noted that Android devices are becoming malware havens. Android was the second most popular environment for mobile malware behind Symbian in the first quarter. Historically, Android remains No. 3.

From the McAfee public report:

McAfee Labs combats several developing families of malware that attack Android phones. One of the families, Android/DrdDream, comprises a variety of legitimate games and apps that have been injected with malicious code. These threats are unique and quite dangerous due to the use of two root exploits to gain greater control of those phones. The two exploits—Exploit/LVedu and Exploit/DiutesEx—were initially used by users trying to gain legitimate root access to their own devices, a process commonly referred to as rooting.1 In the PC world, malware often uses exploits to enable drive-by downloads that infect machines visiting specially designed or compromised websites. For mobile devices, much of the malware has required user interaction, but in the near future mobile exploits will certainly allow automatic malware installation. Like Android/DrdDream, the Android/Drad family is made up of maliciously modified applications. This family sends device information to an attacker-controlled site. Just like in the PC malware world, Android/Drad listens for commands from the attacker. The malware can also download additional software, though it stops short of being a full-fledged mobile botnet. It appears that the malware uses blackhat search-engine optimization techniques, a process of manipulating search engine results to place dangerous sites higher than they should appear in lists of hits.


trakt.tv

Ask Me about HTPC! (Threads in HTPC / PMs always responded to)

This signature is povided by MediaBrowser 3 Trakt Plugin: Media Browser 3